Part of the CompTIA Network+ Study Guide
      
    
    
      
        🔐 CIA Triad
        
          - 
            Confidentiality: Ensures only authorized users can
            access sensitive information using techniques like encryption and
            access controls.
          
 
          - 
            Integrity: Guarantees data has not been altered or
            tampered with, validated through hashing and digital signatures.
          
 
          - 
            Availability: Ensures systems and data are
            accessible when needed, maintained with failovers, backups, and DDoS
            protections.
          
 
        
        
          Visit CISA to learn more.
        
      
      
      
        🛠️ Network Hardening
        
          - 
            Disable unnecessary services and ports to reduce attack surfaces.
          
 
          - 
            Apply patches and firmware updates regularly to fix known
            vulnerabilities.
          
 
          - 
            Use strong passwords and multi-factor authentication across all
            access points.
          
 
          - 
            Enforce configuration baselines for network and security devices.
          
 
          - Physically secure network hardware from unauthorized access.
 
        
        
          NIST Cybersecurity Framework
        
      
      
        🌐 Remote Access
        
          - 
            VPN: Encrypts traffic over the internet to secure
            remote communications.
          
 
          - 
            RDP: Provides graphical access to remote computers;
            must be restricted and encrypted.
          
 
          - 
            Authentication: Secure login methods such as MFA
            reduce the risk of credential-based attacks.
          
 
        
        
          Cisco's VPN Overview
        
      
      
        🏢 Physical Security
        
          - 
            Badge Readers: Grant access based on identity cards
            or tokens.
          
 
          - 
            Locks and Cabinets: Prevent physical tampering or
            theft of hardware.
          
 
          - 
            Surveillance: Monitor and record activities for
            accountability and deterrence.
          
 
          - 
            Visitor Policies: Log and restrict access for
            guests to sensitive areas.
          
 
        
        
          SANS Physical Security Guide